default search action
IET Networks, Volume 9
Volume 9, Number 1, 2020
- Fei Wang, Changchun Qin:
Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users. 1-6 - Juan Zhao, Guihui Xie, Dongming Li, Mailing Song:
Improved GMM-based method for target detection. 7-11 - Rajendran Muthukkumar, D. Manimegalai:
Distributed coalition formation game for enhancing cooperative spectrum sensing in cognitive radio ad hoc networks. 12-22 - Zakia Berber, Samir Kameche, Elhadj Benkhelifa:
Design of integer-N PLL frequency synthesiser for E-band frequency for high phase noise performance in 5G communication systems. 23-28 - Qingbo Du, Faming Yin, Zongchen Li:
Base station traffic prediction using XGBoost-LSTM with feature enhancement. 29-37 - Yanli Li, Xiaonan Wang:
Green content communications in 6LoWPAN. 38-42
Volume 9, Number 2, 2020
- Bhisham Sharma, Mohammad S. Obaidat:
Comparative analysis of IoT based products, technology and integration of IoT with cloud computing. 43-47 - Samaneh Hoghooghi, Reza Javidan:
Proposing a new method for improving RPL to support mobility in the Internet of things. 48-55 - Weijing Wang, Guoxiang Tong:
Multi-path unequal clustering protocol based on ant colony algorithm in wireless sensor networks. 56-63 - V. Ramasamy, B. Gomathy, Joy Lal Sarkar, Chhabi Rani Panigrahi, Bibudhendu Pati, Abhishek Majumder:
EMC2: an emergency management system using mobile cloud computing. 64-73 - Parimala Venkata Krishna, Vankadara Saritha, Mohammad S. Obaidat:
E2CA-SM: an energy-efficient channel allocation with sleep mode for base station in fifth-generation-based cellular network systems. 74-82 - Deepak Kr. Sharma, Swati Singh, Vishakha Gautam, Shubham Kumaram, Mehul Sharma, Shrid Pant:
Ant Router: An efficient routing protocol for social opportunistic networks using ant routing. 83-93
Volume 9, Number 3, 2020
- Zhengxiong Dou, Xiaonan Wang:
Ethernet-based access cloud. 95-101 - Guo-Ming Sung, Yen-Shih Shen, Chih-Ping Yu, Cheng-Syuan Jian:
Two-port-two-port SI between RS485 and Ethernet with an FIFO queue for efficient PC-to-PC communication. 102-109 - Rakesh Ranjan Swain, Tirtharaj Dash, Pabitra Mohan Khilar:
Lightweight approach to automated fault diagnosis in WSNs. 110-119 - Monika Roopak, Gui Yun Tian, Jonathon A. Chambers:
Multi-objective-based feature selection for DDoS attack detection in IoT networks. 120-127 - Ehsan Kharati, Mohammad Khalily Dermany, Hamidreza Karmajani:
Increasing the amount of collected data using network coding and continuous movement of mobile sinks in wireless sensor networks. 128-138 - Xian Liu:
Optimisation of the duplex D2D network: a deep learning approach. 139-144
Volume 9, Number 4, 2020
- Hitesh Mohapatra, Amiya Kumar Rath:
Survey on fault tolerance-based clustering evolution in WSN. 145-155 - Shun-Ping Chung, Hui-Yu Pai, Chia-Hsin Lin, Guan-Ting Lin:
Performance analysis of the pending interest table in the cellular network with reservation and retrials. 156-164 - Hamza Hammami, Sadok Ben Yahia, Mohammad S. Obaidat:
Scalable and efficient authentication scheme for secure smart grid communication. 165-169 - Radhika Gour, Anshul Tyagi:
Cluster oriented resource allocation and power optimisation for D2D network in cellular communications. 170-179 - Quynh Tu Ngo, Duc Ngoc Minh Dang, Quan Le Trung:
Extreme power saving directional MAC protocol in IEEE 802.11ah networks. 180-188 - Kapil Netaji Vhatkar, Girish P. Bhole:
Particle swarm optimisation with grey wolf optimisation for optimal container resource allocation in cloud. 189-199 - Hankiz Yilahun, Kudret Abdurahman, Seyyare Imam, Askar Hamdulla:
Automatic extraction of Uyghur domain concepts based on multi-feature for ontology extension. 200-205
Volume 9, Number 5, September 2020
- Guest Editorial: Selected Papers from the Ubiquitous Clouds and Cognitive Communication Networks (UCCCN 2019). 207-208
- Pradeep Sudhakaran, Chidambaranathan Malathy:
Authorisation, attack detection and avoidance framework for IoT devices. 209-214 - Sivaraman Eswaran, Daniel Dominic, Jayapandian Natarajan, Prasad B. Honnavalli:
Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment. 215-222 - K. Sridharan, G. Komarasamy, S. Daniel Madan Raja:
Hadoop framework for efficient sentiment classification using trees. 223-228 - Padakandla Chenna Praveen Kumar, Polipalli Trinatha Rao:
Design of reconfigurable circularly polarised double folded inverted-L antenna with rectangular ground plane using HFSS. 229-234 - Vijayalakshmi Murugesan, S. Mercy Shalinie, Ming-Hour Yang, Raja Meenakshi U.:
Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions. 235-246 - Raad S. Alhumaima, Saib Thiab Alwan, Riyadh Khlf Ahmed:
Mitigating X2-AP interface cost using quantum teleportation. 247-254 - Ramachandira Moorthy Buvanesvari, Kanagaraj Suresh Joseph:
RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking. 255-261 - Shuan He, Wei Wang:
QoE-aware Q-learning resource allocation for NOMA wireless multimedia communications. 262-269 - David Aondoakaa, John Cosmas, Stephen Swift:
Exploiting heterogeneity for cost efficient 5G base station deployment using meta-heuristics. 270-275
Volume 9, Number 6, November 2020
- Guest Editorial: Intelligent Computing: a Promising Network Computing Paradigm. 277-278
- B. S. Shylaja, R. Bhaskar:
Rough-set and machine learning-based approach for optimised virtual machine utilisation in cloud computing. 279-283 - Whai-En Chen, Chia-Hung Liu:
High-performance user plane function (UPF) for the next generation core networks. 284-289 - Jianneng Chen, Zhen-Jie Huang, Yu-Ping Zhou, Fumin Zou, Chien-Ming Chen, Jimmy Ming-Tai Wu, Tsu-Yang Wu:
Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. 290-297 - Yize Yang, Hong-yong Yang, Yuling Li:
Finite-time convergence of group flocking for multi-agent systems with mismatched/matched disturbances. 298-304 - Dang Huynh-Van, Quan Le Trung:
SD-IoTR: an SDN-based Internet of Things reprogramming framework. 305-314 - Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. 315-325 - Khiet Thanh Bui, Hung Dac Ho, Tran Vu Pham, Hung Cong Tran:
Virtual machines migration game approach for multi-tier application in infrastructure as a service cloud computing. 326-337 - Ko-Tsung Chu, Hua-Ting Hsu, Jyh-Jian Sheu, Wei-Pang Yang, Cheng-Chi Lee:
Effective spam filter based on a hybrid method of header checking and content parsing. 338-347 - Bhushan Yelure, Shefali Sonavane:
ACO-IBR: a modified intersection-based routing approach for the VANET. 348-359 - Ridhima Mehta:
Multi-objective design of energy harvesting enabled wireless networks based on evolutionary genetic optimisation. 360-366 - Ali Ghiasian:
Impact of TCAM size on power efficiency in a network of OpenFlow switches. 367-371 - Jun Li, Xingyu He, Dan Zhao, Guisong Yang, Daojing He, Sammy Chan:
Delay-aware and cost-efficient probabilistic transmission for opportunistic networks. 372-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.